Hi Global Risk Community member,
You have likely heard the words “digital transformation” ad nauseam. Regardless, the increasingly complex world of cloud-based business applications and remote working isn’t going away any time soon. As this complexity of your digital ecosystem increases, so does the need for a strong security and risk management strategy. So where do you start?
The implementation of an Identity Governance and Administration (IGA) solution enables organizations to address many
security (283)
Hi Global Risk Community member,
With the increasingly complex IT-security ecosystems organizations are facing, Identity Governance Administration (IGA) is an important component of an organization’s security model. It provides the foundation for identity management, allowing organizations to ensure users are not given excessive or unnecessary access to systems, applications, or data. Organizations without proper IGA are vulnerable to fraud and data breaches.
Download Fastpath’s “Identit
Hi Global Risk Community member ,
Join us next month for: Think Like a Hacker: Tactics to Identify Gaps in Your IT Security Posture on Thursday, March 16th at 1pm Eastern.
Cybersecurity is one of the largest concerns facing businesses today and hackers continuously develop diverse ways of penetrating your cybersecurity defences. Learn how to think like a hacker and protect your systems and data from cyber threats by taking proactive measures, including:
- Conducting thorou
Hello Global Risk Community member,
Maintaining your ERP, CRM and HCM system security is an ongoing process.
Join Fastpath on Thursday November 3rd at 11 AM ET for a webinar where we will share 50 practical security tips delivered rapid-fire and designed for organizations to start improving their security immediately. We will also review principles for good security moving forward.
In this webinar we will review tips such as:
- Specific security settings
- Improving security via setup
- Process
Fastpath launched a monthly podcast to discuss all things surrounding your enterprise security hosted by Alex Meyer.
Fastpath is launching a new monthly podcast hosted by Microsoft MVP Alex Meyer. The podcast titled “Enterprise Security Inside and Out” delves into all things surrounding your enterprise application security, current trends, best practices for your business application systems such as ERP, HCM and CRM.
The show will also feature insightful interviews with experts who work with th
Hello Global Risk Community member,
Hearst is a media giant with more than 360 businesses diversified across media, information, and services.
After implementing Oracle ERP Cloud, Hearst’s Application Security Audit Manager, Ivan Ng, was tasked with finding a solution that would enable Hearst to have the proper controls in place across all their business units, including those that were not on Oracle yet. Ivan chose Fastpath. Why? “It is very apparent that the application was written by auditor
If you’ve moved from Dynamics AX to Dynamics 365 in the cloud, you should be aware of some changes that will affect how you manage your security settings.
We invite you to download our latest eBook, Security When Migrating D365FO to the Cloud, which covers:
- Changes in the security model from AX on premises to Dynamics 365 in the cloud and the impact these changes will have on your licensing
- Key concepts around strong cloud security
- Security gotchas and questions you should be asking your cloud
This is a transcription of our interview with Liam Healy, SVP and Managing Director at Diligent about ESG, Legal Operations and CyberSecurity.
You can watch the original video interview here or an audio podcast here. You are also welcome to subscribe to our podcast in all major podcast apps by searching "Risk Management Show".
Boris: Welcome to our interview with Liam Healy. Liam is a SVP and Managing Director at Diligent, which is a market leading provider of the comprehensive Governance sof
Free eBook: Common SAP security mistakes and how to fix them
The emergence of smart homes and the consequent prevalence of smart home security cameras has been associated with consumer preference towards energy efficiency and optimum resource utilization. While smart homes are popular for these advantages, security cameras are witnessing a surge in their adoption as we see a rise in security issues in and around these homes. The advent of next-generation wireless technologies such as HVAC Controller, security and access regulators, and entertainment contr
Security information and event management was initially designed to help organizations achieve compliance and keep their information compliant but has evolved over the years. Moving beyond its roots, software vendors now provide machine learning, advanced statistical analysis, and other analysis methods for your products for security information and event management (SIEM).
The SIEM and Threat Management evolution continues to build on a scalable open security platform that supports security and
FranSec Virtual IT Security Conference launches on 24th – 25th June, uniting cyber security leaders from across the country to exchange in-depth knowledge and expertise towards safeguarding the nation’s Banking & Finance, Energy, FMCG, Agriculture, Manufacturing, Chemical & Pharmaceuticals, Automotive industries.
2019 was a record-breaking year for cyber-attacks in France. A staggering 67% of companies fell victim to malicious activity and with only 10% equipped to cope with them. As digitalisat
Health care is focused on the use of innovation and connectivity in an age of digitization to advance the field. Smartphones, cyber networks, mobile devices, and interconnections can be used by healthcare providers to enhance patient care and quality of care.
As consumer requirements grow, health companies and technology giants have the opportunity to develope mHealth applications. Through mobile health apps, players in the healthcare sector are searching for the ability to combine electronic he
Are you newly working from home? Or are you an old pro? Either way, it is likely you are using some form of remote desktop protocol. Those of us who have been working home as our primary means of earning a living, know these tools very well and are accustomed to eliminating the various distractions in our home environment in order to get the job done. There are some precautions to be aware of.
None of us think that we are going to get hacked, even though we have seen time and time again that it i
Once again, tax time has rolled around, and though you technically have until April 15th, it’s always best to file a bit earlier…especially if you want to avoid setting yourself up for ID theft.
How Could Filing Taxes Compromise Your Identity?
Here’s how you could become a victim of ID theft just by filing your taxes: the first method is that a thief uses your Social Security number to file taxes, and then they steal your refund. The second method that they use is they take your Social Security nu
Hey YOU, SMB, yeah I’m talking to you. There are a number of things that you can do to not only protect your personal information, but also the information you have in your business:
- Hire a professional – It is entirely possible the small business was hacked because they did not employ technicians to prevent it in the first place. Therefore 3rd parties that specialize is security and breach mitigation should be contacted immediately. These IT security professionals specialize in containment. Thei
You might not realize it, but your electronic devices may be tracking you. They know what you are doing, what you are reading, and the things you like to do. In almost every case, you give these devices permission to collect this info when you start using them. Here are some tips to help you prevent your devices from spying on you:
Laptops
Macs
If you are using a macOS computer, you can limit the information you are sending to Apple by choosing the Apple menu > System Preferences > Security & Priva
You have likely heard of the dangers of using unsecure public Wi-Fi, so you know that hackers are out there snooping. It is pretty easy to hack into a laptop or mobile device that is on a public Wi-Fi connection with no protection. Hackers can read your emails, steal passwords, and even hijack your website log ins.
Let’s imagine that you are in a local coffee shop with your laptop. All someone has to do is download a wireless network analyzer, which usually has a free trial, and with the right ha
Do you Uber? If you do, you probably feel pretty safe getting into the car of a stranger. However, you might not be as safe as you think.
Most people take for granted that Uber does background checks on its drivers, but there are actually a number of shady drivers who have recently been accused of crime, and it’s definitely not the first time they have had run ins with law enforcement. Some of these people are accused of committing crimes against their passengers, and that’s where things really g
In the age of rapid technological progress, where Digital Transformation has become pervasive, business applications are getting increasingly complex and interconnected. The advancement in technology has also helped attackers get more aggressive and inflict more damage to IT systems and applications. Application security tools and techniques are evolving too, yet most organizations still fall prey to vulnerabilities. Cybersecurity has become a bigger threat than ever before.
The current appli